CVE-2025-12336: SQL Injection in Campcodes Retro Basketball Shoes Online Store
A vulnerability was identified in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_index.php. Such manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-12336 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_index.php file. The vulnerability arises from improper sanitization of the Username parameter, allowing an attacker to inject malicious SQL queries remotely without requiring authentication or user interaction. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive customer data or enabling further compromise of the application. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting a medium severity level due to its remote exploitability and lack of required privileges, but limited impact on confidentiality, integrity, and availability (all rated low). Although no active exploitation has been observed, a public exploit exists, increasing the risk of attack. The lack of patches or vendor advisories necessitates immediate defensive measures. The vulnerability affects only version 1.0 of the product, indicating that upgrading or patching could mitigate the risk. The attack vector is network-based with low attack complexity and no prerequisites, making it accessible to a wide range of attackers.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store platform, this vulnerability could result in unauthorized data access, including customer personal and payment information, leading to privacy breaches and potential regulatory penalties under GDPR. Integrity of the database could be compromised, allowing attackers to alter product listings, prices, or transaction records, which could disrupt business operations and damage reputation. Availability impact is limited but possible if attackers execute destructive SQL commands. Retailers relying on this platform may face financial losses, customer trust erosion, and legal consequences. The presence of a public exploit increases the likelihood of opportunistic attacks, especially targeting smaller retailers with limited security resources. The vulnerability's remote exploitability without authentication makes it a significant risk for online stores operating in Europe, where e-commerce is a critical sector.
Mitigation Recommendations
1. Immediate code review and remediation to properly sanitize and validate the Username parameter in /admin/admin_index.php, employing parameterized queries or prepared statements to prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoint. 3. Monitor application logs and network traffic for unusual or suspicious SQL queries or access attempts to the admin interface. 4. Restrict access to the /admin/ directory through IP whitelisting or VPN-only access to reduce exposure. 5. Conduct security assessments and penetration testing on the e-commerce platform to identify and remediate similar vulnerabilities. 6. Engage with the vendor for official patches or updates; if unavailable, consider migrating to a more secure platform. 7. Educate development and operations teams on secure coding practices and input validation to prevent future injection flaws. 8. Implement regular backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-12336: SQL Injection in Campcodes Retro Basketball Shoes Online Store
Description
A vulnerability was identified in Campcodes Retro Basketball Shoes Online Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_index.php. Such manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-12336 identifies a SQL injection vulnerability in the Campcodes Retro Basketball Shoes Online Store version 1.0, specifically within the /admin/admin_index.php file. The vulnerability arises from improper sanitization of the Username parameter, allowing an attacker to inject malicious SQL queries remotely without requiring authentication or user interaction. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive customer data or enabling further compromise of the application. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting a medium severity level due to its remote exploitability and lack of required privileges, but limited impact on confidentiality, integrity, and availability (all rated low). Although no active exploitation has been observed, a public exploit exists, increasing the risk of attack. The lack of patches or vendor advisories necessitates immediate defensive measures. The vulnerability affects only version 1.0 of the product, indicating that upgrading or patching could mitigate the risk. The attack vector is network-based with low attack complexity and no prerequisites, making it accessible to a wide range of attackers.
Potential Impact
For European organizations using the Campcodes Retro Basketball Shoes Online Store platform, this vulnerability could result in unauthorized data access, including customer personal and payment information, leading to privacy breaches and potential regulatory penalties under GDPR. Integrity of the database could be compromised, allowing attackers to alter product listings, prices, or transaction records, which could disrupt business operations and damage reputation. Availability impact is limited but possible if attackers execute destructive SQL commands. Retailers relying on this platform may face financial losses, customer trust erosion, and legal consequences. The presence of a public exploit increases the likelihood of opportunistic attacks, especially targeting smaller retailers with limited security resources. The vulnerability's remote exploitability without authentication makes it a significant risk for online stores operating in Europe, where e-commerce is a critical sector.
Mitigation Recommendations
1. Immediate code review and remediation to properly sanitize and validate the Username parameter in /admin/admin_index.php, employing parameterized queries or prepared statements to prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoint. 3. Monitor application logs and network traffic for unusual or suspicious SQL queries or access attempts to the admin interface. 4. Restrict access to the /admin/ directory through IP whitelisting or VPN-only access to reduce exposure. 5. Conduct security assessments and penetration testing on the e-commerce platform to identify and remediate similar vulnerabilities. 6. Engage with the vendor for official patches or updates; if unavailable, consider migrating to a more secure platform. 7. Educate development and operations teams on secure coding practices and input validation to prevent future injection flaws. 8. Implement regular backups and incident response plans to quickly recover from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T12:41:34.030Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69000cd9ba6dffc5e21dd5b8
Added to database: 10/28/2025, 12:22:49 AM
Last enriched: 11/4/2025, 3:30:33 AM
Last updated: 12/13/2025, 7:56:08 AM
Views: 143
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9207: CWE-20 Improper Input Validation in templateinvaders TI WooCommerce Wishlist
MediumCVE-2025-8779: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shamsbd71 All-in-One Addons for Elementor – WidgetKit
MediumCVE-2025-10289: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wssoffice21 Filter & Grids
MediumCVE-2025-14586: OS Command Injection in TOTOLINK X5000R
MediumCVE-2025-10738: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in rupok98 URL Shortener Plugin For WordPress
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.